<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249392-what-is-mitigation-under-the-hipaa-privacy-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/feature-spotlight-understanding-vendor-management</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259428-what-entities-are-exempt-from-the-texas-medical-records-privacy-act-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247106-what-are-limited-data-sets-and-data-use-agreements-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259478-when-are-business-associates-directly-liable-for-hipaa-violations-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248392-when-does-the-privacy-rule-allow-covered-entities-to-disclose-phi-to-law-enforcement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248575-what-is-verification-of-identity-and-authority-under-the-hipaa-privacy-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259363-am-i-required-to-certify-my-organization-s-hipaa-compliance-</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/learning-overview</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246917</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249729-what-are-credentialing-activities-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247423-what-are-workforce-sanctions-policies-under-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255898-what-is-a-hipaa-security-official-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248745-does-osha-apply-to-workers-who-work-from-home-or-offsite-</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-force-registering-users</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/share-with-the-team-employee-notification-email</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274121-what-is-the-availability-of-ephi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255968-how-to-create-training</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246086-what-is-hipaa-social-media-compliance-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246396-what-are-vulnerability-scans-</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273531-what-forms-are-hipaa-forms-and-what-forms-are-not-hipaa-forms-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250044-threat-2-of-the-top-5-threats-facing-the-healthcare-sector-ransomware</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/feature-spotlight-risk-assessment-/-programs</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252450-what-is-the-difference-between-a-business-associate-and-a-business-associate-subcontractor-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253014-what-are-the-hipaa-security-rule-physical-safeguards-device-and-media-controls</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273528-what-are-the-proposed-updates-to-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001251352-when-is-a-vendor-of-a-covered-entity-not-a-business-associate-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a-comprehensive-guide-to-hipaa-patient-authorization-requirements</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-dashboard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/building-a-culture-of-conformance-in-the-guard</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259393-people-employee-profile</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250043-threat-1-of-the-top-5-threats-facing-the-healthcare-sector-social-engineering</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248384-what-fees-may-covered-entities-charge-individuals-for-copies-of-their-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249844-hipaa-privacy-rule-right-to-request-restriction-of-uses-and-disclosures-of-phi</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247110-what-are-hipaa-psychotherapy-notes-behavioral-health-and-mental-health-provider-terms</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/what-is-the-status-of-the-2024-eeoc-enforcement-guidance-on-workplace-harassment</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245736-what-are-the-differences-between-policies-and-procedures-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-roles-responsibilities-permissions-in-the-guard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-adding-and-managing-vendors</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246294-what-are-the-hipaa-rules-on-surveillance-cameras-and-recording-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273527-must-a-patient-sign-a-notice-of-privacy-practices-or-acknowledgment-of-receiving-the-npp-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249990-what-are-the-sanctions-requirements-under-the-hipaa-privacy-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247279-how-can-providers-educate-patients-on-the-risks-of-telehealth-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249715-what-is-the-federal-exclusion-statute-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-my-tasks</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-compliancy-groups-hipaa-ocr-audit-response-program-arp</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259243-does-hipaa-address-continuing-education-ce-cme-or-continuing-education-accreditation-requirements-</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-documents</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/assets-overview</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250144-what-is-a-designated-record-set-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246391-does-the-hipaa-security-rule-require-employee-background-checks-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/where-do-i-start-advice-for-guard-customers-from-a-compliance-professional</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246927-can-my-organization-appoint-an-outside-person-as-the-hipaa-privacy-official-or-hipaa-security-officia</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247749-how-to-complete-training</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248390-what-are-treatment-payment-and-healthcare-operations-activities-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246911-standards-overview</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/monitoring-viewing-and-updating-training</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001260387-comprehensive-guide-to-hipaa-and-confidentiality-agreements</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246900</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249411-breach-notification-rule-guidance-to-render-unsecured-phi-unusable-unreadable-or-indecipherable-to</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249987-what-is-the-hipaa-privacy-rule-documentation-requirement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259425-what-are-the-texas-medical-records-privacy-act-marketing-rules-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home</loc><image:image><image:loc>https://47667694.fs1.hubspotusercontent-na1.net/hubfs/47667694/Compliancy%20Group%20logo%20(3).png</image:loc><image:caption>CompliancyGrouplogo3</image:caption><image:title>CompliancyGrouplogo3</image:title></image:image><lastmod>2024-12-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249946-what-are-incidental-uses-and-disclosures-of-phi-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247405-what-are-the-hipaa-rules-on-marketing-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246093-what-is-an-accounting-of-disclosures-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259422-how-long-do-texas-hb-300-covered-entities-have-to-respond-to-ehr-electronic-health-record-requests-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255589-what-are-the-hipaa-security-rule-documentation-requirements-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246903</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274072-what-is-the-confidentiality-of-ephi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/quarterly-compliance-review-checklist-in-the-guard</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-adding-deactivating-users-and-setting-roles</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249673-when-is-a-data-breach-not-required-to-be-reported-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249986-what-is-the-hipaa-privacy-rule-training-requirement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252845-what-is-the-hipaa-security-rule-evaluation-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246070-what-is-the-relationship-between-hipaa-and-workers-compensation-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-the-guard-dashboard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250189-what-is-a-hipaa-authorization-for-uses-and-disclosures-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274125-what-are-the-hipaa-breach-notification-letter-requirements-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001264088-policies-uploading-a-document</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/feature-spotlight-policy-management</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-the-guards-asset-manager</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247401-what-are-the-hipaa-rules-on-fundraising-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274115-what-is-the-integrity-of-ephi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/exporting-reports</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001260575-what-is-sensitive-personal-information-under-hb-300-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259426-does-texas-hb-300-permit-the-sale-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250826-who-is-regulated-by-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001264835</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/applications-overview</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001256951</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246083-when-can-phi-disclosures-be-made-for-judicial-and-administrative-proceedings-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/what-is-the-hipaa-privacy-rule-right-of-access-a-guide-to-what-may-be-requested-and-accessed</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273786-cybersecurity-and-single-sign-on-sso-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-single-sign-on-sso</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/assigning-roles-and-permissions-in-the-guard</loc><lastmod>2025-08-25</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255972-how-to-create-training-with-custom-courses</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-the-document-manager</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001264846</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247926-what-are-the-hipaa-rules-on-use-and-disclosure-of-genetic-information-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246408-who-can-access-or-receive-the-phi-of-deceased-individuals-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249458-what-is-a-hipaa-privacy-official-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274073-what-is-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246387-what-are-hipaa-security-rule-audit-controls-audit-logs-and-audit-trails-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001205794-independent-contractor-vs-hipaa-workforce-member-classification-guide</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/the-top-failed-controls-and-how-to-clean-them-up</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/hotline-reports-overview</loc><lastmod>2026-01-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247196-does-hipaa-impose-requirments-on-the-mailing-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/compliance-operations-overview-what-are-false-claims-act-and-qui-tam-lawsuits</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001257026-are-laboratories-covered-entities-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246029-compliancy-group-s-hhs-ocr-hipaa-audit-response-program</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255857-where-are-hhs-resources-for-the-change-healthcare-cyberattack-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001251341-when-is-a-healthcare-provider-a-covered-entity-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247496-when-may-a-covered-entity-deny-a-patient-request-to-amend-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255478-what-is-the-hhs-hipaa-final-rule-to-support-reproductive-healthcare-privacy-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253443-what-are-the-hipaa-rules-for-the-disposal-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273549-how-can-i-use-compliancy-group-s-software-the-guard-to-work-on-my-hipaa-security-risk-assessment-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001179152-how-does-the-hipaa-privacy-rule-protect-the-confidentiality-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001178575-what-is-a-hipaa-business-associate-or-vendor-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252975-what-are-the-hipaa-security-rule-physical-safeguards-workstation-security-controls</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247504-policies-how-to-assign-for-attestation</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-hipaa-breach-notification-letter-requirements</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249712-what-is-a-covered-entity-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246388-what-are-the-components-of-a-hipaa-contingency-plan-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/how-to-conduct-a-security-risk-analysis</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246932-am-i-required-to-have-an-alarm-alarm-system-for-my-facility-under-the-hipaa-regulations-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001193188-job-aid-for-analysis-of-security-of-phi</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-assigning-training-to-users</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/compliance-operations-what-is-the-emergency-medical-treatment-and-labor-act-emtala</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001267583-what-is-a-hipaa-business-associate-agreement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253017-what-is-the-hipaa-security-rule-transmission-security-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246280-what-are-medical-record-and-other-record-retention-requirements-under-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001257083</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001254241-what-are-the-proper-methods-for-ephi-disposal-and-destruction-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245841-what-is-a-hipaa-notice-of-privacy-practices-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001273534-what-is-a-hipaa-it-disaster-recovery-plan-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/feature-spotlight-locations-permissions-alerts</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-changing-account-details-and-password</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252974-what-are-the-hipaa-security-rule-physical-safeguards-workstation-use-controls</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246245-the-hipaa-right-of-access-rule-encryption-and-texting-or-emailing-of-phi</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246909</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001251122-what-is-the-hipaa-security-rule-workforce-security-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259423-does-the-texas-medical-records-privacy-act-tmrpa-permit-reidentification-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250689-people-employee-portal</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250135-what-is-the-hipaa-security-rule-authentication-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259414-what-are-the-texas-hb-300-training-requirements-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249408-negotiating-business-associate-agreements-general-information</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248379-what-is-a-hipaa-hybrid-entity-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255704-what-are-the-hipaa-security-rule-s-required-vs-addressable-standards-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/incidents-module-overview-0</loc><lastmod>2026-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247501-policies-activating-a-policy</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259993-comprehensive-guide-to-the-hipaa-notice-of-privacy-practices</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/managing-incidents-or-breaches-in-the-guard</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246914</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253655-do-consumers-and-would-be-patients-create-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/kb-search-results</loc><image:image><image:loc>https://47667694.fs1.hubspotusercontent-na1.net/hubfs/47667694/Compliancy%20Group%20logo%20(3).png</image:loc><image:caption>CompliancyGrouplogo3</image:caption><image:title>CompliancyGrouplogo3</image:title></image:image><lastmod>2024-12-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250045-what-are-the-rules-on-hipaa-and-research-is-a-researcher-covered-by-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248383-what-is-the-hipaa-right-of-access-and-when-must-covered-entities-respond-to-right-of-access-requests-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247497-classifying-medical-device-companies-under-hipaa</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250832-what-is-information-system-activity-review-under-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-managing-vendor-agreements-in-the-guard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250739-what-are-hipaa-data-backup-requirements-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001275148-threat-5-of-the-top-5-threats-facing-the-healthcare-sector-attacks-against-network-connected-medic</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250600-what-is-the-difference-between-an-ocr-hipaa-settlement-and-an-ocr-hipaa-fine-civil-monetary-penalty-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-multi-factor-authentication-2fa-mfa</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001218922-how-to-implement-patching</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259365-policies-export-options</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247996-does-hipaa-apply-to-employee-health-information-maintained-by-employers-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253680-what-is-the-difference-between-uses-of-phi-and-disclosures-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245839-who-must-be-notified-of-a-breach-and-what-information-must-the-notification-contain-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/programs-overview</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247408-what-are-the-hipaa-rules-on-the-sale-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001275141-threat-3-of-the-top-5-threats-facing-the-healthcare-sector-loss-or-theft-of-equipment-or-data</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252686-when-is-a-business-associate-agreement-not-required-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/settings-module-overview</loc><lastmod>2025-09-02</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249849-right-to-request-communications-of-phi-by-alternative-means-or-at-alternative-locations</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-training-certificate-of-achievement</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250040-federal-government-cybersecurity-resources-the-405-d-program-and-hicp</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-tips-for-managing-affiliates-business-associates</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/accessing-and-managing-billing</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/your-first-90-days-what-to-accomplish</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/my-work-overview</loc><lastmod>2026-03-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/https/knowledge.compliancygroup.com/home/purchasing-tokens-for-training-courses</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-registering-for-the-guard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274819-where-can-i-find-federal-government-and-hhs-resources-for-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/best-practices-to-drive-internal-adoption-building-habits-that-stick</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249532-where-can-i-find-federal-government-cybersecurity-resources-and-guidelines</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/compliance-operations-what-are-the-information-blocking-regulations</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-how-do-i-add-a-task-to-the-guard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/kb-tickets/new</loc><image:image><image:loc>https://47667694.fs1.hubspotusercontent-na1.net/hubfs/47667694/Compliancy%20Group%20logo%20(3).png</image:loc><image:caption>CompliancyGrouplogo3</image:caption><image:title>CompliancyGrouplogo3</image:title></image:image><lastmod>2024-12-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-how-to-reset-your-password</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001260723-comprehensive-guide-what-happens-after-a-hipaa-complaint-is-filed-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249985-how-to-file-a-hipaa-privacy-or-security-complaint</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/compliance-operations-what-is-the-no-surprises-act</loc><lastmod>2026-02-12</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249658-hipaa-and-job-shadowing</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274120-what-is-the-hipaa-minimum-necessary-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247500-are-disability-insurance-companies-and-other-insurance-benefits-companies-covered-entities-under-hipa</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246472-what-is-phi-hipaa-key-definitions-to-understanding-what-phi-is-health-information-individually-ide</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/using-filters-and-tags-across-the-guard</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246475-what-are-the-general-requirements-of-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247304-what-is-a-hipaa-business-associate-subcontractor-agreement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001264835-exclusion-monitoring</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253353-hipaa-and-virtual-private-networks-vpns-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001179148-what-is-a-security-risk-assessment-sra-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249716-are-accreditation-organizations-business-associates-of-the-covered-entities-they-accredit-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250136-what-are-best-practices-for-password-selection-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246908</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-completing-the-breach-determination-assessment-form</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248867-filing-a-complaint-with-a-hipaa-covered-entity</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246012-what-is-macra-mips-new-for-2024-25-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-logging-into-the-guard</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001264381</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/how-to-create-an-account-in-the-customer-portal</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001252847-what-are-the-hipaa-security-rule-physical-safeguards-facility-access-controls</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248660-hipaa-ferpa-and-student-medical-records</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246473-what-are-the-security-rule-key-terms-and-definitions-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/how-to-clear-your-browser-cache</loc><lastmod>2025-08-22</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246803-what-osha-records-may-an-employee-access-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253016-what-is-the-hipaa-security-rule-security-awareness-and-training-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247495-do-patients-have-the-right-to-request-amendment-of-their-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274069-what-is-the-hipaa-privacy-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259404-who-does-hb-300-apply-to-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247503-how-to-attest-to-policies</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/monitored-by-compliancy-group-trust-badges</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-reports</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250046-what-are-the-hipaa-obligations-of-a-covered-entity-with-respect-to-research-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001260995-osha-safety-standards-commonly-asked-questions</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249991-what-are-the-hipaa-security-rule-incident-response-and-reporting-requirments-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/privacy-guidance-what-are-the-content-requirements-for-the-revised-notice-of-privacy-practices-</loc><lastmod>2026-02-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/data-security-guidance-the-difference-between-the-proposed-hipaa-security-rule-update-and-an-actual-rule-change</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245298-minor-children-and-parental-rights-to-phi</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246910</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001260577-what-penalties-does-a-tmrpa-covered-entity-face-for-an-hb-300-violation-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001254769-hipaa-myth-there-are-four-hipaa-rules-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245853-introduction-to-hipaa</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001248043-are-hipaa-covered-entities-required-to-purchase-cyber-insurance-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001251123-what-are-hipaa-security-rule-integrity-controls-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001253502-what-is-multi-factor-authentication-mfa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/exclusion-monitoring-vendors</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259337-hipaa-and-encryption-a-guide</loc><lastmod>2025-09-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-people</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001247945-what-is-de-identified-phi-and-what-is-re-identified-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001245294-the-seven-fundamental-elements-of-an-effective-compliance-program</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001275145-threat-4-of-the-top-5-threats-facing-the-healthcare-sector-insider-accidental-or-malicious-data-lo</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001274070-what-is-the-hipaa-breach-notification-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/introduction-to-the-guard</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001178584-what-is-protected-health-information-phi-electronic-protected-health-information-ephi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001264921</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250828-what-is-risk-management-under-the-hipaa-security-rule-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001250134-may-a-hipaa-covered-entity-use-a-csp-that-stores-ephi-on-servers-outside-of-the-united-states-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001246998-where-can-i-find-the-safety-data-sheet-sds-for-a-hazardous-chemical-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001251407-hipaa-and-workplace-wellness-programs</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/home/legacy-my-documents</loc><lastmod>2025-01-08</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001193187-completing-the-breach-determination-assessment-form</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249607-what-is-a-confidentiality-agreement-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001246907</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001259427-what-are-the-texas-hb-300-rules-on-electronic-disclosure-of-phi-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001249840-what-is-the-hipaa-security-rule-information-access-management-standard-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001255845-what-is-hhs-guidance-on-the-use-of-online-tracking-technologies-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/support/solutions/articles/48001254106-can-an-entity-be-covered-by-the-texas-medical-records-privacy-act-and-not-by-hipaa-</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://knowledge.compliancygroup.com/home/a/solutions/articles/48001269009</loc><lastmod>2025-07-10</lastmod></url></urlset>